MAUHtKSON KWOK CHEN
xa* amass or
NMrmtscmicwoie
ULEN A intU) Uf
34&MKHBLS0NDS.
suite 210
xrvske, caj06u
FAXCN9)7n.T»49
NO. 254 P. 3
I Applicants);
I Assignee:
Title:
Serial No.:
Examiner
Docket No.:
In The Un ited States Patent Amp Trademark Office
Greg Benson; Gregory H. Urich; Christopher L. Rnauft
Macrovision Corporation
METHOD AND SYSTEM FOR MANAGING A DATA OBJECT SO
AS TO COMPLY WITH PREDETERMINED CONDITIONS FOR
USAGE
09/321,386
M. VonBuhr
M-I5081 US
Filing Date: May 27,1 999
Group Art Unit 2171
Mail Stop Amendment
COMMISSIONER FOR PATENTS
I Arlington, VA 223 13-1450
Irvine, California
August 22, 2003
AMENDMENT
I Dear Sin
Applicants submit the following amendments and remarks.
-1-
Serial No. 09/321386
NO. P. 4
IN THE CT, ATMS
Please cancel Claims 55-63, 67^74, 77-78, 81-82,
S /
86-87, and 96-150.
IAW OFTXCU OF
Mm* BTB30H K*OK
OWN A KUQ> LLt
sums no
OVINE, CA Mf 12
1. (original) A method of managing a data object so as to comply with control |
conditions for usage of the data object, comprising:
storing a data object in the memory of a data object provider processor,
providing a variable number of control conditions for usage of the data object;
providing a general set of control data for the data object based on the variable
number of control conditions for usage, the general set of control data comprising at
least one or more usage control elements defining usages of the data object which
comply with the variable number of control conditions; and
encrypting at least the data object to create a secure data package so mat it is
ready to transfer to a user data processor.
2. (original) The method of Claim 1, additionally comprising encrypting together I
the data object and the general set of control data-
3. (original) The method of Claim 1, wherein providing the general set of control |
data includes providing an identifier which uniquely identifies the general set of control data.
4. (original) The method of Claim 1, wherein providing the general set of control
data includes providing a security control element which identifies a security process to be
applied before usage of the data object is allowed.
5. (original) The method of Claim 1, wherein providing the general set of control
data includes providing a format control element which identifies the format of the control
data.
6. (original) The method of Claim 1, additionally comprising:
receiving a request for authorization for usage by a user;
comparing the usage for which authorization is requested with the one or more
usage control elements of the general set of control data; and
y.l
-2-
Serial No. 09/521,336 1
r
NO. 254 P. 5
id
LAWOfnCKSOV
cbck a una u»
sunsuo
FAX (>»y>
granting the authorization if the usage for which authorization is requested
complies with the usages defined by the one or more usage control elements.
7, (original) The method of Claim 6, additionally comprising requiring payment
for the requested authorization for usage before granting the authorization.
8. (original) The method of Claim 1, additionally comprising:
transmitting the secure data package into the data processor;
checking, in response to a request by a user for usage of the data object,
whether the requested usage complies with the usage defined by the at least one usage
control element of the general set of control data; and
decrypting, in response to the requested usage complying with the usage
defined by the at least one usage control element of the general set of control data, the
data object so as to enable the requested usage.
9. (original) The method of Claim 8, additionally comprising:
combining, after the usage of the data object, the data object and the one or
more usage control elements; and
reencrypting at least the data object
1 0. (original) A method of controlling the usage by a user of a data object so as to
comply with control conditions for usage of the data object, comprising:
providing a variable number of control conditions for usage of the data object;
providing a data object and control data, which comprises at least one usage
control element defining a usage of the data object which complies with the variable
number of control conditions, the data object being encrypted;
receiving a request by the user for usage of the data object;
checking, in response to the request by the user for usage of the data object,
whether the requested usage complies with the usage defined by the at least one usage
control element of the control data; and
decrypting, in response to the requested usage complying with the usage
defined by the at least one usage control element of the control data, the data object
and enabling the requested usage.
V.1
Serial No. 09/321,386
NO. 254 P. 6
6
lAWOffXCESO*
CHEN ABEDtlf
SUITE UO
IRVINE. CASOfU
FaX <•>♦*) fS3-1«4>
11. (original) The method of Claim 10, wherein the usage control element is
updated after the at least one usage of the data object
12. (original) The method of Claim 10, wherein the control data comprises an
indication of the number of times the user is authorized to use the data object in accordance
with the at least one usage control element, wherein the requested usage of the data object is
only enabled when the number of times is one or more, and wherein the number of times is
decremented by one when the requested usage is enabled.
13. (original) The method of Claim 10, wherein the control data comprise a
security control element, and additionally comprising executing, before each usage of the data
object, a security procedure defined in the security control element.
14. (original) The method of Claim 10, wherein checking whether the requested
usage complies with the usage defined by the at least one usage control element, comprises
checking that a data processor is capable of executing a security procedure specified in a
security control element of the at least one usage control element, and if not, disabling the
usage.
1 5. (original) The method of Claim 1 0, additionally comprising:
combining, after the usage of the data object, the data object and the one or
more usage control elements; and
reencrypting at least the data object
16. (original) A system for managing a data object so as to comply with control
[ conditions for usage of the data object, comprising:
a user interface module which receives a variable number of control
| conditions;
a packaging module which provides a general set of control data for the data
object based on the variable number of control conditions for usage, the general set of
control data comprising at least one or more usage control elements defining usages of
.■vJ
Serial No. 09/321,386
NO. 254 P. 7
the data object which comply with the variable number of control conditions and
which packages the general set of control data; and
an encrypting module which encrypts the data object to create a secure data
package, which is ready for transfer to a user.
(a
lAwovncssor
MxM£JtSOrtK*Ofc
CHEK4aODUr
«W MTCHELSON WL
5UTTE2W
JRVDS.CA9U11
17. (original) The system of Claim 16, wherein the general set of control data |
| comprises a control data element which controls further distribution of the data object
1 8. (original) The system of Claim 16, wherein one of the usage control elements |
includes a security control element that defines a security procedure.
19. (original) A system for controlling the usage by a user of a data object so as to |
comply with control conditions for usage of the data object, comprising:
a usage manager module which receives a variable number of control
conditions, checks whether a usage requested by the user complies with the usage
defined by at least one usage control element that complies with the variable number
of control conditions, and disables the usage requested by the user when the usage
does not comply with the usage defined by the at least one usage control element; and
a decryption module which decrypts the data object, responsive to the check
for requested usage by the usage manager module.
20. (original) The system of Claim 19, wherein one of the usage control elements |
includes a security control element that defines a security procedure.
21 . (original) The system of Claim 20, wherein the security procedure is an RSA i
encryption algorithm.
22. (original) The system of Claim 19, wherein the usage manager module
encrypts the data object after usage.
23. (original) A method of controlling the usage by a user of data objects so as to
comply with a variable number of conditions for usage of the data objects, comprising:
-5-
Serial No. 09/321,386
>w^«i niivn ^HCh
NO. 254 P. 8
providing at least two data packages, each data package comprising a data|
object and a user set of control data, which comprises at least one usage control
element defining a usage of the data object which complies with the variable number j
of conditions, the data object being encrypted;
examining the usage control elements of the at least two data packages to find
a match; and
performing an action being specified in the user sets of control data of the at
least two data packages.
24. (original) The method of Claim 23, wherein one of the at least two data
| packages is a sell order, and wherein one of the at least two data packages is a buy order.
25. (original) The method of Claim 23, additionally comprising checking whether
| a data processor is capable of executing a security procedure specified in a security control
j element of the at least one usage control element, and disabling the usage when the data|
processor is not capable of executing the security procedure, and decrypting the data objects.
26.
(original) The method of Claim 25, additionally comprising:
updating the at least one usage control element of each data package; and
reencrypting each of the data object
LA<"omecsor
WefBtMOWlf OK
GSSf ftHSDu*
iMiMmonMBR.
fUIZlM
nvMCCMttll
27. (original) A method of managing a data object so as to comply with a variable j
number of control conditions for usage of the data object, comprising:
providing variable control conditions for usage of the data object;
providing a general set of control data for the data object based on the variable
control conditions for usage, the general set of control data comprising at least one or
more usage control elements defining usages of the data object which comply with the
variable control conditions;
providing, in response to a request for authorization for usage of the data
object by a user, a user set of control data, which comprises at least a subset of the
general set of control data, including at least one of the usage control elements;
encrypting at least the data object to create a secure data package; and
VJ
-6-
Serial No. 09/321,386 j
NO. 254 P. 9
checking, before allowing transfer of the data package to the user, that the
request for authorization for usage of the data object has been granted
28. (original) The method of Claim 27, additionally comprising checking whether ]
a data processor is capable of executing a security procedure specified in a security control
element of the at least one usage control element, and disabling the usage when the data]
processor is not capable of executing the security procedure.
29. (original) The method of Claim 27, wherein the data object is composed of at |
| least two constituent data objects and wherein the user set of control data, in response to a ,
I request for authorization for usage of one of the constituent data objects by a user, is created |
I OTdy f0r ** *** object and combined only with a copy of that constituent data
I object.
30. (original) The method of Claim 27, wherein the request for authorization is
[ received from a user via a data network.
31. (original) The method of Claim 27, wherein the data object is a composite data I
I object including at least two constituent data objects, and wherein providing a general set of |
control data comprises providing a respective general set of control data for each of the
constituent data objects and the composite data object, and wherein providing a user set of
control data comprises providing a respective user set of control data for each of the!
constituent data objects and the composite data object
32. (original) The method as defined in Claim 27, additionally comprising storing |
| the user set of control data in a processor of a data object provider.
33
(original) The method as defined in Claim 27, additionally comprising:
transmitting the data package;
checking, in response to a request by the user for usage of the data object,
whether the requested usage complies with the usage defined by the at least one usage
control element of the user set of control data; and
-7-
Serial No. 09/321,386
f. 10
6i
CBSMABXZD U»
sunssto
iRVDV.CAflsn
J) 752-7040
decrypting, in response to the requested usage complying with the usage
defined by the at least one usage control element of the user set of control data, the
data object and enabling the requested usage.
34.
(original) The method of Claim 27, additionally comprising:
transmitting the data package; and
reencrypting the data object
35. (original) A system for managing a data object so as to comply with control |
conditions for usage of the data object, comprising:
apackaging module which provides a general set of control data for the data
object based on variable conditions for usage, the general set of control data
comprising at least one or more usage control elements defining usages of the data
object which comply with the variable conditions and which combines the user set of
control data with the data object, and wherein the packaging module provides in
response to a request for authorization for usage of the data object by a user, a user set
of control data, which comprises at least a subset of the general set of control data,
which subset comprises at least one of the usage control elements;
an encrypting module which encrypts the data object to create a secure data
package, which is ready for transfer to a user, and
a control module which checks that the request for authorization for usage of
the data object has been granted before allowing transfer of the data package to the
user.
36. (original) A method of managing a data object so as to comply with control
conditions for usage of the data object, comprising:
providing a general set of control data for the data object based on a variable
number of control conditions for usage, the general set of control data comprising at
least one or more usage control elements defming usages of the data object which
comply with the variable number of control conditions; and
encrypting at least the data object to create at least one secure data package,
which is ready for transfer to a user.
I
▼a
Serial No. 09/321,386
• kiivwii i\tfur\ oncm
NO. 254 P. 11
37. (original) The method of Claim 36, wherein the data object and the usage |
! control elements are encrypted into a single secure package.
38. (original) The method of Claim 36, wherein providing the general set of
j control data includes providing a security control element which identifies a security process
to be applied before usage of the data object is allowed.
39. (original) The method of Claim 36, wherein providing the general set of I
I control data includes providing a format control element which identifies the format of the j
I control data.
40. (original) The method of Claim 36, additionally comprising:
receiving a request for authorization for usage by a user;
comparing the usage for which authorization is requested with the one or more
usage control elements of the general set of control data; and
granting the authorization if the usage for which authorization is requested
complies with the usages defined by the one or more usage control elements.
41 . (original) A method of managing a data object at a data provider computer so
I as to comply with control conditions for usage of the data object, comprising:
providing a variable set of control data for the data object, the variable set of |
control data including usage information regarding the data object;
concatenating the variable set of control data with the data object; and
encrypting at least the data object to create at least one secure data package i
that is ready for transmission to a user data processor.
42. (original) The method of Claim 41, wherein the encrypting includes storing |
| the at least one secure data package at the data provider computer.
43. (original) A method of managing a data object at a data provider computer so j
I as to comply with control conditions for usage of the data object, comprising:
V.1
-9-
Serial No. 09/321,386 j
providing a set of control data for the data object based on a variable number
of control conditions for usage, the set of control data including usage information I
regarding the data object;
combining the set of control data with the data object; and
encrypting at least the data object to create at least one secure data package, so j
that the at least one secure data package is stored in the data provider computer.
44. (original) The method of Claim 43, additionally comprising transmitting the
least one secure data package to the user data processor.
at I
45. (original) The method of Claim 43, wherein the data object
money.
comprises digital j
46. (original) The method of Claim 43, wherein the data object comprises an |
empty file.
author.
47. (original) The method of Claim 43, wherein the data object is created by
an I
48. (original) A method of managing a data object so as to comply with control I
conditions for usage of the data object, comprising:
storing a data object in the memory of a data object provider processor,
providing a variable number of control conditions for usage of the data'object;
and
providing a set of control data for the data object based on the variable number
of control conditions for usage, the set of control data comprising at least one or more
usage control elements defining usages of the data object which comply with the
variable number of control conditions.
49. (original) The method of Claim 48, additionally comprising:
transmitting the data object and the set of control data into a data processor, I
and
i
-10-
Serial No. 09/321,386
MM. 1 1. 0 '■ UWAM lYIALTHtKbUN KWUK CHbN
6'
NO. 2b4 P. 13
checking, in response to a request by a user for usage of the data object,
whether the requested usage complies with the usage defined by the at least one usage
control element of the set of control data; and
complying with the usage defined by the at least one usage control element of
the set of control data so as to enable the requested usage.
50. (original) The method of Claim 49, additionally comprising combining, after
the usage of the data object, the data object and the one or more usage control elements.
51. (original) The method of Claim 49, wherein the data object comprises digital
data.
52. (original) The data object of Claim 49, wherein the control data comprises an
object identifier.
53. (original) The data object of Claim 49, wherein the data object comprises a
video file.
uwomasor
mmmxsqh jcwok
CHEN * HUD UT
KcaHrrwfgywDX
suns 2io
OWINE,CA«Qfitl
54,
(previously canceled)
55. - 63, (canceled)
64. - 66. (previously canceled)
67. - 74. (canceled)
75. - 76. (previously canceled)
77. - 78. (canceled)
79. - 80. (previously canceled)
81. -82, (canceled)
-11-
Serial No. 09/321,386